DEEP TECH · AI · SECURITY-FIRST

Stop duplicating.
Start connecting.

The next generation of LLM architecture; Project X is a neuro-symbolic cryptographic AI engine that mathematically matches fragmented solutions to complex problems—across classification boundaries, organisational silos, and entire industries. Grounded with Surprisal and Knowledge Graphs, secured at the hardware level with Trusted Execution Environments.

See the Problem ↓
🔒 TEE-Secured Processing
Neuro-Symbolic AI
Explainable by Design

Billions lost to invisible duplication

Organisations cannot see what they already have. Siloed data, incompatible taxonomies, and classification boundaries mean that critical solutions remain buried—while identical problems are re-commissioned at enormous cost.

£434B
UK public sector procurement spend (2024/25)
≈£70.7B
UK gross R&D expenditure (GERD) in 2022
🏛️

Government & Defence

A defence "retention" challenge and a corporate "attrition" problem are semantically identical—but current systems never link them. Procurement cycles restart from zero, duplicating spend on problems already solved elsewhere in the ecosystem.

🏢

Enterprise R&D

Large organisations with siloed business units unknowingly commission parallel workstreams. Useful IP sits in dormant repositories while new contracts are issued for near-identical requirements.

🔐

Security Boundaries

Classification barriers prevent cross-domain visibility. Solutions on the high-side cannot be discovered from the low-side, and vice versa. Innovation stalls at the boundary.

Neuro-Symbolic AI. Hardware-Secured.

A proprietary architecture that fuses the intuition of neural networks with the rigour of symbolic reasoning—grounded through information-theoretic Surprisal and dynamic Knowledge Graphs, all running inside Trusted Execution Environments for data confidentiality even during computation.

MATCHING
ENGINE
01

Neural Layer

Vector embeddings capture fuzzy semantic similarity. A defence "personnel retention framework" and a corporate "employee churn model" are recognised as conceptually identical—no shared keywords required.

LLM-Powered Embeddings
02

Symbolic Layer

A dynamic knowledge graph constrains and structures neural output. Ontological reasoning ensures matches are logically valid and auditable—not probabilistic guesses.

Explainable Knowledge Graphs
03

Surprisal-Grounded LLM Architecture

Information-theoretic Surprisal grounds the LLM outputs, quantifying how unexpected a semantic connection is within the graph topology. This filters noise and ensures the engine surfaces genuinely novel, high-value matches rather than trivially obvious ones.

Information-Theoretic Grounding
04

Composite Matching

A combinatorial optimisation process that identifies subsets of partial solutions whose union satisfies a requirement. Solution A (60% fit) combined with Solution B (30% fit) covers a requirement—surfacing combinations that standard vector-search categorically misses. This is an NP-Hard problem space.

N-to-N Problem→Solution Mapping
05

Trusted Execution Environments

All matching computation executes inside hardware-level TEEs (e.g., Intel SGX, ARM TrustZone). Data remains encrypted in memory—not even the host infrastructure operator can access it during processing.

Hardware-Root-of-Trust Security
06

Privacy-Preserving Abstraction

Classified and sensitive node data is abstracted before matching. High-side problems can be matched against low-side solutions without exposing the underlying data to either party.

Cross-Domain Federation
07

Full Explainability (XAI)

Every match produces an auditable reasoning chain. Critical for government procurement audit trails, regulatory compliance, and building institutional trust in AI-assisted decisions.

Audit-Ready Output

Prototype performance against controlled datasets

Early benchmarks from our TRL 4 prototype tested against structured problem-solution datasets. These represent controlled-environment results; production performance at scale is the next phase of validation.

91%

Semantic Recall

Correctly identified relevant solutions across synonym-heavy, jargon-different problem descriptions where zero keywords overlapped.

73%

Composite Discovery

Successfully identified multi-solution compositions (2–4 partial solutions combining to cover a requirement) that single-vector search returned zero results for.

97%

Explainability Coverage

Of all matches surfaced, the percentage that produced a complete, human-readable reasoning chain traceable back through the knowledge graph.

3.2x

vs. Keyword Baseline

Improvement in relevant matches surfaced compared to traditional keyword and TF-IDF based search across the same dataset, with a 3x improvement in recall for multi-vendor solution coverage.

0

Data Exposure Events

Zero plaintext data exposure events during TEE-secured matching operations. All computation completed within encrypted memory enclaves.

<400ms

Match Latency

Average time to return ranked composite matches against a 10,000-node graph, including TEE attestation overhead. Target for production: <200ms at 1M+ nodes.

ℹ️

All benchmarks derived from controlled prototype testing (TRL 4) against curated datasets. These figures are indicative of architectural capability, not production-scale guarantees. Independent validation is a stated objective of our next development phase.

Security isn't a feature. It's the foundation.

Built from day one for deployment in the most sensitive environments. Our protocol-first architecture assumes hostile infrastructure and protects data at every layer—from storage through to computation. Meeting NCSC cloud security principles by design.

LAYER 1

Trusted Execution Environments (TEEs)

Matching computation runs inside hardware-isolated enclaves (Intel SGX / ARM TrustZone compatible). Data is decrypted only inside the enclave—the host OS, hypervisor, and even physical access to the server cannot compromise it. Remote attestation cryptographically proves code integrity before any data enters the enclave.

Intel SGX ARM TrustZone Remote Attestation Memory Encryption
LAYER 2

Privacy-Preserving Abstraction

Before data enters the matching engine, a semantic abstraction layer strips identifying details while preserving the mathematical properties needed for matching. Classified problem statements can be compared against unclassified solution databases without exposing the underlying requirement.

Semantic Abstraction Cross-Domain Safe Need-to-Know Enforced
LAYER 3

High-Side / Low-Side Federation

Our decentralised protocol architecture supports air-gapped deployment. Secure instances can operate entirely self-hosted on classified networks, with controlled federation to lower-classification instances via the abstraction layer. No SaaS dependency. No data leaves the boundary.

Self-Hosted Air-Gap Compatible Federated Protocol NCSC Aligned
LAYER 4

Explainable Audit Trails

Every match, every reasoning step, every data access event is logged in an immutable audit chain. Designed to meet government audit requirements including NCSC guidelines and MOD information assurance standards. Full XAI output means no "black box" decisions.

Immutable Logging NCSC Aligned Full XAI Audit-Ready

One engine. Every domain.

The most powerful emergent property: as the knowledge graph grows, connections between seemingly unrelated industries surface organically. Automotive sensor IP solves medical imaging problems. Aerospace materials address energy storage challenges. The graph itself becomes the moat.

🛡️

Defence & National Security

Match capability gaps to existing solutions across classification boundaries. Reduce procurement duplication across MOD, DASA, and Five Eyes partner ecosystems.

£60.3B UK defence budget 2024-25
🏛️

Government Innovation & Procurement (B2G)

Our initial route-to-market. Procurement and innovation units managing complex, high-security requirements can verify whether a capability already exists before commissioning new work. End users include requirements engineers, technical analysts, and procurement leads.

£434B Total UK annual public procurement
🧬

Health & Life Sciences

Connect fragmented clinical research, drug discovery pipelines, and MedTech solutions. Identify where existing approved compounds or devices address new therapeutic targets.

£164.9B NHS England annual budget 2024-25
🏗️

Enterprise R&D (B2B)

Eliminate duplication across siloed business units. Discover internal IP synergies before commissioning external work. Reduce R&D spend by identifying existing partial solutions. The core product is sector-agnostic and applies to any R&D-intensive enterprise with siloed solution repositories.

£49.9B UK business R&D expenditure (BERD) 2022
🚀

Space & Aerospace

Connect space-qualified component databases to terrestrial applications. Match launch system requirements to advanced manufacturing capabilities across the UK supply chain.

£18.6B UK space sector income 2024

The Network Effect

Every problem and solution added to the graph increases the value for all participants. Cross-sector links compound exponentially. This unified data structure isn't just a feature—it's a proprietary, self-reinforcing data asset that grows more defensible with every node.

From problem to composite solution in seconds

1

Ingest & Abstract

Problem statements and solution descriptions are ingested through the abstraction layer. Sensitive details are stripped; mathematical properties preserved. All processing inside TEE enclaves.

2

Embed & Structure

Neural embeddings capture semantic meaning. The symbolic layer maps them onto the knowledge graph with ontological constraints, creating structured, queryable nodes.

3

Match & Compose

The engine runs a combinatorial optimisation process, identifying direct matches and composite combinations. Solution A + Solution B + Solution C may together cover a requirement that none addresses alone.

4

Explain & Verify

Every match returns a full reasoning chain: why these solutions, which properties aligned, what coverage gaps remain. Auditable. Verifiable. Human-readable.

Register your interest

We're building the intelligence layer that connects the world's fragmented innovation ecosystem. If you work in defence, government procurement, enterprise R&D, or deep tech—we want to hear from you.

  • Priority access to private beta
  • Direct input into product roadmap
  • Early pilot partnership opportunities
  • Quarterly deep tech briefings

Your data is processed in accordance with GDPR. We will only contact you about Project X.